Skip to main content

Home

 

Find us on

facebook youtube flickr twitter itunes u logo

Upcoming Events

Sal Stolfo

Salvatore J. Stolfo Columbia University
A Brief History of Symbiote DefenseTuesday, October 31st
Rockefeller 003
5:00 PM

 Fright Night Imge

Wanna See Something REALLY Scary?
ISTS Looks at the Dark Web on Halloween Night
Tuesday, October 31st
Sudikoff  045 Trust Lab (dungeon)
7:30 PM - RSVP
Space is Limited 

   

Recent Talks

Dan Wallach

STAR-Vote: A Secure, Transparent, Auditable and Reliable Voting System

Professor Dan Wallach
Rice University
Thursday April 27, 2017
Carson L01, 5:00 PM

Ben Miller Dragos

Pandora's Power Grid - What Can State Attacks Do and What Would be the Impact?

Ben Miller
Chief Threat Officer, Dragos, Inc.
Tuesday May 2, 2017
Kemeny 007, 4:30 PM
Brendan Nyhan

 

 

 

Factual Echo Chambers? Fact-checking and Fake News in Election 2016.

Professor Brendan Nyhan
Dartmouth College
Thursday May 4, 2017
Rocky 001, 5:00 PM

Dickie George

 

Espionage and Intelligence

Professor Dickie George
Johns Hopkins University
Thursday May 11, 2017
Rocky 001, 5:00 PM

Dan Wallach

A Nation Under Attack: Advanced Cyber-Attacks in Ukraine

Ukrainian Cybersecurity Researchers
Thursday April 6, 2017
Oopik Auditorium 5:30 PM

ISTS Information Pamphlet


2012BrochureCover

 

Institute for Security, Technology, and Society
Dartmouth College
6211 Sudikoff Laboratory
Hanover, NH 03755 USA
info.ists@dartmouth.edu

Analysis of the Jurisdictional Thresholds for Prosecuting Cyber Crimes in the United States at the State Level

Project Summary

To facilitate law enforcement efforts to combat cybercrime, the Technical Analysis Group prepared a comparative analysis of state cybercrime laws for the some of the most pressing areas of cybercrime. Interaction with state and local law enforcement revealed that a tool to quickly compare various states' cybercrime laws would be useful. The Technical Analysis group research directly meets this need. TAG's findings are not intended as legal advice, nor are they intended to present a comprehensive analysis of all cybercrime laws. TAG's research is designed to assist local law enforcement and prosecutors in making a preliminary comparative determination as to what types of computer-related criminal activities may be prosecuted in various states together with the accompanying levels of punishment. To that end, TAG's report utilizes tables to represent what type of computer-related criminal activities may be prosecuted under a specific statute and provides a combined table for each major area of computer crime to assist in comparing prosecutable activities between states. Prosecutors may find the description of each table heading useful. Each table heading description contains explanations and examples of such criminal activity and describes how it may be prosecutable under the applicable state statutes.

  • Project Lead: Andrew McPherson

Last Updated: 9/9/15